Aug 9, 2016 Department of the Treasury, Treasury Directive 85-03: Authorities of the Departmental Chief Information Officer to Respond to Information Technology Security Incidents, Threats, and Vulnerabilities, August 09, 2016
Aug 8, 2016 Office of the Inspector General, Nuclear Regulatory Commission, OIG-16-A-18, Cybersecurity Act of 2015 Audit for NRC, August 8, 2016. Unclassified. Source Nuclear Regulatory Commission.
Aug 4, 2016 United States Senate, Letter from Senators Markey and Blumenthal to Chairman Tom Wheel of the Federal Communications Commission Regarding Safety and Privacy and Vehicle Communication Technologies, August 4, 2016. Unclassified. Source Office of Senator Markey
Aug 2, 2016 Department of the Treasury, Improvements are Needed for Information Technology Contract Administration Controls to Mitigate Risks, August 02, 2016
Aug 1, 2016 National Institute for Standards and Technology, NIST Special Publication 800-175A, Guideline for Using Cryptographic Standards in the Federal Government: Directives, Mandates and Policies, August 2016. Unclassified. Source NIST.
Aug 1, 2016 Department of Energy, Fact Sheet: DOE Award Selections for the Development of Next Generation Cybersecurity Technologies and Tools, August 2016. Unclassified. [2310] Source Department of Energy
Aug 1, 2016 Department of Energy (U.S.), Fact Sheet: DOE Award Selections for the Development of Next Generation Cybersecurity Technologies and Tools, August 2016
Aug 1, 2016 Department of Energy (U.S.), Summary Report: Department of Energy's implementation of Selected Controls as Defined in the Cybersecurity Act of 2015, August 2016
Aug 1, 2016 Department of Justice, Office of Public Affairs, FBI Employee Pleads Guilty to Acting in the United States as an Agent of the Chinese Government, August 01, 2016
Aug 1, 2016 European Network and Information Security Agency (ENISA), ENISA, The cost of Incidents Affecting CIIs: Systematic Review of studies concerning the economic impact of cyber-security incidents critical information infrastructures, August 2016
Aug 1, 2016 National Institute of Standards and Technology, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, August 2016
Aug 1, 2016 National Institute of Standards and Technology, SHA-3 Derived Functions: cSHAKE, KMAC, TupleHas and ParallelHash, August 2016
Aug 1, 2016 National Institute of Standards and Technology, Report on Lightweight Cryptography, August 2016
Aug 1, 2016 National Institute of Standards and Technology, De-Identifying Government Datasets, August 2016
Aug 1, 2016 National Institute of Standards and Technology, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, August 2016
Aug 1, 2016 National Institute of Standards and Technology, SHA-3 Derived Functions: cSHAKE, KMAC, TupleHas and ParallelHash, August 2016
Aug 1, 2016 National Institute of Standards and Technology, Report on Lightweight Cryptography, August 2016
Aug 1, 2016 National Institute of Standards and Technology, De-Identifying Government Datasets, August 2016
Aug 1, 2016 Office of the Inspector General, Department of the Interior, Report No.: 2016-ITA-032, Inspection of Federal Computer Security at the U.S. Department of the Interior, August 2016. Unclassified. Source Department of the Interior.